Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2024, 22:37

General

  • Target

    192f1508ce9f2b6d61cd163da10608d0N.exe

  • Size

    110KB

  • MD5

    192f1508ce9f2b6d61cd163da10608d0

  • SHA1

    e2f5c0a190fb22a3a17e54e61200d04cd60404e2

  • SHA256

    7e0a4f40aaf10c411ced9b097b12a06e7d78f00c6b329a07547ad842f2391f60

  • SHA512

    4099f201b3ce07bb4cdc3c1a3fbc547626481122730ea490edadba0efc9a863e1c86ecc0e09ee090ef22978e30d1a7d3b81cbd5b25e468bbfeb67303d0739312

  • SSDEEP

    3072:6e7WpMaxeb0CYJ97lEYNR73e+eKZOf7fYxw:RqKvb0CYJ973e+eKZOf7ft

Score
9/10

Malware Config

Signatures

  • Renames multiple (2945) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\192f1508ce9f2b6d61cd163da10608d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\192f1508ce9f2b6d61cd163da10608d0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1700

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

          Filesize

          110KB

          MD5

          ce47e2b8dac09ab92d55b13b2d96ee12

          SHA1

          f27f48c91f7d42f8a37d45127b2c3e3f910cfbd5

          SHA256

          d4e29e56d5f6bc44acb561596a205677f85a0c4aa0398d3fc6931fbea3e167c6

          SHA512

          8e9662631193b40d43e4324ac5031a3ff3f8cad2226cb4fe28ae12857832fb9e830e1d71e1de843041161804a6ba8dc4c921a6ab5d5a45bc503841e4b4023e36

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          119KB

          MD5

          e716c0c0aa52404466b350c0cdc2539a

          SHA1

          ebab3b2e37b8b3a9a36d90bd2fe595924883819e

          SHA256

          765f43d4c400ddbbaa1bb56dd3f6c0ee3c30600ac079037851842d3a6722e784

          SHA512

          e892e9ab1155d26e5dc41b17aa488b892e6512d890815b89b6db497fccf477d4c4c6cfb7a35021ef2cbe4a65a1150674779bdbb2b798c3eaa3c7a5c9540e598d